OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The infinite race between steganography and steganalysis in images
Trivikram Muralidharan, Aviad Cohen, A.S. Cohen, et al.
Signal Processing (2022) Vol. 201, pp. 108711-108711
Closed Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al.
Neurocomputing (2024) Vol. 581, pp. 127528-127528
Open Access | Times Cited: 16

Self-attention enhanced deep residual network for spatial image steganalysis
Guoliang Xie, Jinchang Ren, Stephen Marshall, et al.
Digital Signal Processing (2023) Vol. 139, pp. 104063-104063
Open Access | Times Cited: 33

A comprehensive survey on stegomalware detection in digital media, research challenges and future directions
Laila Tul Badar, Barbara Carminati, Elena Ferrari
Signal Processing (2025), pp. 109888-109888
Open Access

Enhancing Data Hiding Methods for Improved Cyber Security Through Histogram Shifting Direction Optimization
Alek Nur Fatman, Tohari Ahmad, Ntivuguruzwa Jean De La Croix, et al.
Mathematical Modelling and Engineering Problems (2023) Vol. 10, Iss. 5, pp. 1508-1514
Open Access | Times Cited: 12

A Novel Gradient-guided Post-processing Method for Adaptive Image Steganography
Guoliang Xie, Jinchang Ren, Stephen Marshall, et al.
Signal Processing (2022) Vol. 203, pp. 108813-108813
Open Access | Times Cited: 17

Steganalysis of AI Models LSB Attacks
Daniel Gilkarov, Ran Dubin
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4767-4779
Closed Access | Times Cited: 2

Visually meaningful cipher data concealment
Zeba Shamsi, Lilapati Waikhom, Anish Kumar Saha, et al.
Digital Signal Processing (2024) Vol. 155, pp. 104717-104717
Closed Access | Times Cited: 2

Enhancing image steganography via adversarial optimization of the stego distribution
Hongyue Zha, Weiming Zhang, Nenghai Yu, et al.
Signal Processing (2023) Vol. 212, pp. 109155-109155
Closed Access | Times Cited: 6

Deep Learning for Diverse Data Types Steganalysis: A Review
Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4

NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
Adrian-Cătălin Rus, Mohammed El‐Hajj, Dipti Kapoor Sarmah
Computers & Security (2024) Vol. 140, pp. 103797-103797
Open Access | Times Cited: 1

Fast dominant feature selection with compensation for efficient image steganalysis
Xinquan Yu, Yuanyuan Ma, Yi Zhang, et al.
Signal Processing (2024) Vol. 220, pp. 109475-109475
Closed Access | Times Cited: 1

Maximizing complex features to minimize the detectability of content-adaptive steganography
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Image steganography approaches and their detection strategies: a survey
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 1

Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
Fredy Varghese, P. Sasikala
Wireless Personal Communications (2023) Vol. 130, Iss. 1, pp. 551-578
Closed Access | Times Cited: 3

Defeating MageCart Attacks in a NAISS Way
Cătălin Rus, Dipti Kapoor Sarmah, Mohammed El‐Hajj
(2023), pp. 691-697
Open Access | Times Cited: 3

Efficient JPEG image steganography using pairwise conditional random field model
Yuanfeng Pan, Jiangqun Ni, Qingliang Liu, et al.
Signal Processing (2024) Vol. 221, pp. 109493-109493
Closed Access

Maximizing steganalysis performance using siamese networks for image
Lingyan Fan, Jinxin Qiu, Zichi Wang, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 76953-76962
Closed Access

Low Dimensional Multi Class Steganalysis of Spatial LSB based Stego Images Using Textural Features
Veena Thanasekaran, S. Arivazhagan
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access

Dual-domain joint optimization for universal JPEG steganography
Xiang Li, Xiaolong Li, Yao Zhao, et al.
Journal of Visual Communication and Image Representation (2024) Vol. 101, pp. 104151-104151
Closed Access

Enhancing Security through Advanced Image Steganography Techniques
Pooja Bhatt, BHAVIK PARGI, R. Uday Kumar
OPSearch American Journal of Open Research (2024) Vol. 3, Iss. 3, pp. 921-927
Open Access

Steganographic Technologies in the Identification of Convicted Persons
Yerbol Tokzhanov, Dina Kalmaganbetova, Assel Kussainova, et al.
Deleted Journal (2024), Iss. 16.3, pp. 275-294
Open Access

Enhancing Steganography through Optimized Quantization Tables
Rasa Brūzgienė, Algimantas Venčkauskas, Šarūnas Grigaliūnas, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2415-2415
Open Access

A Review of Image Steganography Based on Multiple Hashing Algorithm
Abdullah M. Al‐Enizi, Mohammad Sajid Mohammadi, Ahmad A. Al-Hajji, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2463-2494
Open Access

A Comparative Analysis on Exploration of Stegosploits across Various Media Formats
R Asharani, K Vidyalakshmi
(2024), pp. 1-8
Closed Access

Page 1 - Next Page

Scroll to top